Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8121
Environmental literacy, the key to sustainable conservation of wetlands in urban areas
Published 2024-01-01“…The study concluded that individuals are more concerned with their primary needs of securing food and shelter, with little or no consideration of the after effects of such on the environment which include individual heath, as well as depreciation of other services and goods found in wetlands. …”
Get full text
Article -
8122
Simulation and Strategy for Salinity Control Scheduling in Dongjiang Delta of Pearl River Basin in Severe Drought Year
Published 2024-07-01“…This will essentially ensure the water supply security in the Dongjiang Delta. This paper provides some reference for the river discharge dispatching and salinity control during the dry season in the Dongjiang Delta.…”
Get full text
Article -
8123
-
8124
Mineral Composition of Lentils: Physiological Functions, Antinutritional Effects, and Bioavailability Enhancement
Published 2021-01-01“…Thus, lentils play a major role in food security, particularly among low-income countries. …”
Get full text
Article -
8125
Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm
Published 2021-01-01“…The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.…”
Get full text
Article -
8126
The concept of civil law incentives
Published 2024-12-01“…This is especially evident in contractual relations of obligation. The regulatory (security) function of civil law incentives is associated with the legal formalisation of achieving, first and foremost, private interests. …”
Get full text
Article -
8127
Challenging Our Assumptions: Listening to Refugee and Immigrant Women’s Voices About Career Aspirations
Published 2025-01-01“…These newcomers face significant barriers to obtaining economic stability. Those who secure a job usually work in low-paying, entry-level positions such as food service, hospitality, or cleaning. …”
Get full text
Article -
8128
Principles of Preventive Police Activity: Concepts, Content and Their Classification
Published 2019-09-01“…The principles of preventive activities, depending on the method of their regulatory consolidation, are classified into: 1) general legal principles that determine the principles of formation and implementation of state policy in the field of national security; 2) basic principles that characterize the purposefulness, content and limits of police activity and are enshrined in the provisions of the Law of Ukraine “On the National Police”; 3) special principles that characterize the specificity of preventive police activity. …”
Get full text
Article -
8129
Development and Validation of Cloud-based Heart Rate Variability Monitor
Published 2024-12-01“…Aims: Medical investigations carried out at dispensaries or hospitals impose substantial physiological and psychological stress (white coat effect), disrupting cardiovascular homeostasis, which can be taken care by point-of-care cloud computing system to facilitate secure patient monitoring. Settings and Design: The device employs MAX30102 sensor to collect peripheral pulse signal using photoplethysmography technique. …”
Get full text
Article -
8130
The “Nixon China Shock” in the Mirror of Japanese Domestic Politics
Published 2019-12-01“…Nixon about the recent trip of his National Security Advisor H. Kissinger to the PRC and about the President’s upcoming visit there) became one of the pivotal points in the history of Japanese foreign policy and contributed to Tokyo becoming more independent from Washington in its diplomatic course. …”
Get full text
Article -
8131
Global FRAND-Licensing by EU National Courts: The Winner Asks Them All? – On Global SEP Disputes and International Jurisdiction
Published 2023-06-01“…Parties are fighting to secure jurisdictions for a judicially determined portfolio FRAND licence by seeking anti-suit-injunctions or anti-anti-suitinjunctions (and so on). …”
Get full text
Article -
8132
Assessment of Production and Utilization Practices of Orange-Fleshed Sweet Potatoes (Ipomoea Batatas L.) in Sidama Region, Ethiopia
Published 2022-01-01“…Sweet potato (Ipomoea batatas L.) is an important crop which ensures food security in developing countries. It can be harvested at any stage as needed, thereby providing a flexible source of food and income for rural families that are most vulnerable to crop failures and cash income fluctuations. …”
Get full text
Article -
8133
Perspectives of high-risk pregnant women on home care program in high-risk pregnancies: A multicenter, qualitative study
Published 2025-01-01“…The themes and categories were “high-risk pregnancy and related issues (pursuing treatment and paying attention to the high-risk situation by pregnant women, psychological aspect of high-risk pregnancy on pregnant women and caregivers, emotional and physical aspects of high-risk pregnancy, the consequences of high-risk pregnancy on the people around them and empowerment of high-risk pregnant women)”, “support dimension (family and community support for high-risk pregnant women)”, and “framework of program (acculturalization, means and equipment, security, manpower and the necessary arrangements for the home care)”. …”
Get full text
Article -
8134
Characterizing agronomic, morphological, nutritional, and phytochemical traits of local sorghum (Sorghum bicolor L.) in Indonesia
Published 2024-07-01“…These findings highlight the potential of local Tritiro sorghum as a valuable nutritional resource and its suitability for cultivation in the region, contributing to food security and sustainable agricultural practices. …”
Get full text
Article -
8135
-
8136
Comparative Analysis of Visual Field Characteristics and Perceptual Processing in Peripheral Vision Between Virtual Reality and Real World
Published 2024-01-01“…In various domains, virtual reality (VR) has emerged as a valuable tool for simulating specific scenarios and facilitating training within controlled and secure conditions. As peripheral vision plays a crucial role in numerous contexts, it must be duly considered in VR simulations. …”
Get full text
Article -
8137
RUSSIAN-ARAB COOPERATION BEFORE AND AFTER THE "ARAB SPRING"
Published 2014-06-01“…Ultimately, the firm position of Russia on the Syrian issue secured her role as an important political player in the Middle East. …”
Get full text
Article -
8138
Cleaner Production Quality Regulation Strategy of Pharmaceutical with Collusive Behavior and Patient Feedback
Published 2020-01-01“…The quality of pharmaceuticals has always been a hot issue in the world, and it involves public health, economic development of countries, social stability, and national security. Cleaner production is a prerequisite for ensuring the quality of medicines. …”
Get full text
Article -
8139
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
8140
Asynchronous Advanced Encryption Standard Hardware with Random Noise Injection for Improved Side-Channel Attack Resistance
Published 2014-01-01“…A novel method to further augment NCL AES hardware with random voltage scaling technique is also presented for additional security. Thereby, the proposed components leak significantly less side-channel information than conventional clocked approaches. …”
Get full text
Article